Some Aspects of Cybersecurity Protection Provided for Critical Infrastructure Objects: Experience that can be Implemented in Ukraine

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cybersecurity and Critical Infrastructure Protection

Cybersecurity entails the safeguarding of computer networks and the information they contain from penetration and from malicious damage or disruption. Since the use of computer networks has become a major element in governmental and business activities, tampering with these networks can have serious consequences for agencies, firms and individuals. The question is to what degree these individua...

متن کامل

Can Critical Information Infrastructure Protection be Achieved With Untested Software?

Citizens of modern societies need access to information infrastructures that are reliable, secure, non-interruptible, and fault-tolerant. In October of 1997, President Clinton’s Commission on Critical Infrastructure Protection (PCCIP) announced that the United States’s infrastructure, which is responsible for relaying information and communications, is vulnerable to information warfare attacks ...

متن کامل

Improving Critical Infrastructure Cybersecurity

VeriSign, Inc. operates several of the world’s largest and most important DNS Registries (.com, .net, .gov, and more). Because of this operational role that we fulfill, we continually strive to foster and ensure the security and stability of the global Internet [10]. In this vein, we applaud the National Institute of Standards and Technology’s (NIST’s) request for information: NIST Docket Numbe...

متن کامل

Can Aspects Be Injected? Experience with Replication and Protection

Separation of concerns, which allows programming the nun-functional aspects of an application in a more or less orthogonal manner from the functional code, is becoming a general trend in software development. The most widely used architectural pattern for implementing aspects involves indirection objects, raising a performance overhead at execution time. Thus, it appears as being an attractive ...

متن کامل

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm

This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Security of the Person, Society and State

سال: 2019

ISSN: 2707-7276

DOI: 10.51369/2707-7276-2019-3-5